Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 28 Nov 2007 14:39:55 +0100
From:      Remko Lodder <remko@FreeBSD.org>
To:        Schiz0 <schiz0phrenic21@gmail.com>
Cc:        freebsd-bugs@freebsd.org, Alexander Berjoza <bereza.alexander@gmail.com>
Subject:   Re: Some error in php4-4.4.7_2
Message-ID:  <474D6FAB.1070000@FreeBSD.org>
In-Reply-To: <8d23ec860711280456j6705df5dk128cee1c08467fc4@mail.gmail.com>
References:  <9a89bfc60711280425s5beec8f0w48ddd195479b76cf@mail.gmail.com> <8d23ec860711280456j6705df5dk128cee1c08467fc4@mail.gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help
Schiz0 wrote:
> On Nov 28, 2007 7:25 AM, Alexander Berjoza <bereza.alexander@gmail.com> wrote:
>> Good day,
>>
>>   I have a problem. I can't install PHP4 on my server.
>> Problem is, by steps:
>>
>>   0. Port is not installed on my system
>>
>>   1. I try to install from ports PHP4 (/usr/ports/lang/php4) and get message
>>      ===>  php4-4.4.7_2 has known vulnerabilities:
>>      => php -- multiple vulnerabilities.
>>         Reference: <
>> http://www.FreeBSD.org/ports/portaudit/71d903fc-602d-11dc-898c-001921ab2fa4.html
>>      => Please update your ports tree and try again.
>>      *** Error code 1
>>
>>   2. Then I update ports (using cvsup and then portupgrade) and try again,
>> and get this message again
>>      ===>  php4-4.4.7_2 has known vulnerabilities:
>>      => php -- multiple vulnerabilities.
>>         Reference: <
>> http://www.FreeBSD.org/ports/portaudit/71d903fc-602d-11dc-898c-001921ab2fa4.html
>>      => Please update your ports tree and try again.
>>      *** Error code 1
>>
>> Thank you for answer.
>>
>> Alexander
>>   tel.  : 80979195448
>>   e-mail: bereza.alexander@gmail.com
>> _______________________________________________
>> freebsd-bugs@freebsd.org mailing list
>> http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
>> To unsubscribe, send any mail to "freebsd-bugs-unsubscribe@freebsd.org"
>>
> 
> It's just saying that php4 has some vulnerabilities. You have to
> define the env variable "DISABLE_VULNERABILITIES" to skip this check.
> 
> See http://www.freebsd.org/cgi/man.cgi?query=ports&apropos=0&sektion=0&manpath=FreeBSD+6.2-stable&format=html
> Look towards the bottom.

If you offer this solution please do not forget to notice that this is
at your own risk, we do not identify vulnerabilities for nothing and
you can be under risk doing this. Please consider carefully; or use a
supported (by the PHP team) version of PHP which has no known
vulnerabilities at the moment (the 5.x branch at the moment).

//Remo

-- 
/"\   Best regards,                      | remko@FreeBSD.org
\ /   Remko Lodder                       | remko@EFnet
 X    http://www.evilcoder.org/          |
/ \   ASCII Ribbon Campaign              | Against HTML Mail and News



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?474D6FAB.1070000>